Special Holiday Edition the Ten Dumbest Things People Do to Mess

Total Page:16

File Type:pdf, Size:1020Kb

Special Holiday Edition the Ten Dumbest Things People Do to Mess Volume 5, Number 12 December 2008 Special Holiday Edition Editor’s Note: (Wyman): This year’s Special Holiday Edition presents a comprehensive security strategy that ordinary computer users can follow, from plugging a computer into the outlet and connecting to the Internet, to keeping out the Bad Guys and preparing for disaster. The Ten Dumbest Things People Do to Mess Up Their Computer #1: Plug into the Wall without Surge Protection All it takes to destroy your computer is an ordinary power surge coursing through it. There is no need for a raging electrical storm. Anything that interrupts the power flow to your computer and then starts it again abruptly can fry your system. Something as simple as turning on an appliance that's plugged into the same circuit (e.g., a hair dryer, electric heater, or air conditioner) can cause a power surge. Digital devices, like computers, printers and scanners, are especially vulnerable to surges. Even if your lights go out for just a minute and then come right back on, that could create a surge big enough to bring your system to its knees. And if you haven't backed up your files (see #10 below), your email and files could be gone forever. You can protect your computer, printer, scanner, and other components against damaging power surges by using a computer-grade surge protector. Cheap surge protectors may not respond quickly enough to save your computer, and are only good for one surge. Then you'll have to buy another one anyway. An uninterruptible power supply ("UPS" or "battery backup") is even better. It provides surge protection, and in an outage keeps power flowing for long enough (usually 10-20 minutes) so you can save that file and do a normal shutdown. Better UPSs will even shut down your computer for you before the battery is exhausted, and reboot your computer automatically when the power comes back on. #2: Surf the Internet without a Hardware Firewall and a Software Firewall Many home users plug their computers directly into their new cable or DSL modem and hop right onto the Internet, never stopping to think about the risks they are taking. Every Internet-connected computer should be protected by a hardware firewall. Don’t assume that one is built into your broadband modem or router -- check it out with a technician. Firewall appliances can be inserted between the modem/router and your computer. Every Internet-connected computer should also be protected by a two-way (incoming and outgoing) software firewall that can ward off any threats that get by the hardware firewall. Windows XP only has a one-way software firewall (incoming): that's not good enough anymore. Replace it with a better one. Windows Vista has a two-way firewall built in, but by default it only works one-way (incoming). You have to enable the two- way mode. Make sure you do that. That holds true for Mac OS X, too. A special note of caution for laptop owners. Whether you are on the road, staying at a hotel, or just down the street having a cup of coffee, think twice before you connect to SANS OUCH! Volume 5, Number 12 Page 1 someone else’s network. Do you know if it even has a hardware firewall? Especially on a wireless network, you might be sharing the safe zone created by the firewall with a dozen or more other computers, and who knows what nasty stuff might be loose on them? All the more reason to make double-sure that your laptop has a two-way software firewall installed and providing maximum protection. #3: Turn off the Antivirus Because It Slows Down Your System Antivirus programs can be a pain in the neck. Sometimes they block an application you want to use. Sometimes you have to disable them to install new software. They have to be updated on a regular basis. The software costs money, and then you have to pay more money for the update subscription, which is forever prompting you to renew it. Worst of all, it can slow down your system -- or at least appear to -- which prompts many users to shut it off or uninstall it altogether. "Wow! Now my computer is faster, and as far as I can tell, it's working fine without it." Famous last words. Good-quality antivirus software detects and neutralizes thousands of varieties of viruses, worms, Trojans, and blended-threats. If just one of those nasties makes it on to your computer, not only will your data be toast, but the same nasty can spread from your computer to other computers with disastrous results for family members and co-workers. If you are convinced that your current antivirus is bogging down your computer, don't turn it off. Instead, consider installing a more efficient product. Better yet, shop around for a computer security suite: antivirus, antispyware and a two-way software firewall rolled into one package. This will save you money and installation work, while protecting your computer against a variety of threats. If you aren't sure what to buy, talk with a computer security consultant, read reviews online and in magazines, or call the technical support line provided by the manufacturer of your computer. And don't forget about phishing protection for your browser. Internet Explorer 7 has a phishing filter built-in; make sure it is enabled. FirePhish, an anti- phishing extension for Firefox, is a free download. #4: Install and Uninstall Lots of Programs, Especially Freeware Some computer users are perfectly happy with the software they've used for a long time. They even resist getting newer versions because it requires re-learning how to do things in a different way. For them, the computer is only a tool, and as long as the tool gets the job done, it's fine. Other people, the “Power Users,” insist on having the “beta” version -- the pre-release version -- as soon as it comes out. Beta software is an experimental version of a new program, still under development, and not yet for sale, but which contains “new software or new features and enhancements of existing software.” Some of those may still be untested and unproven, but that adds to the adventure. Betas are usually free, and sometimes "unstable", but they hold the promise of greater things to come that you can try out before other people. There are also many freeware and shareware programs marketed by their authors directly on the Internet as downloads: antivirus programs, screensavers, Web accelerators, smiley faces for email, games, utilities to undelete your files, and music and videos. And every SANS OUCH! Volume 5, Number 12 Page 2 now and then, eager computer enthusiasts succumb to the temptation of grabbing up bootlegged software. So, where's the harm? Everywhere. The more freeware/ shareware programs you install, the more likely you are to run across one that includes malicious code, or interferes with the security software on your computer. Bootlegged software may come on an infected CD or DVD, or be stored on a download server that has been compromised. Pirates are notorious for their lack of caution and sympathy. OK, so you install only licensed, commercial software products -- lots of them. Different problem, same risk. Too many installations and uninstallations can foul up the Windows Registry or another operating system component, and along with that, your security software. Sometimes uninstallers don’t remove every component of a program. Processes may still be running in the background, and those may create security holes now or in the future. Obsolescent software often contains vulnerabilities and security holes that its manufacturer knows about, but is no longer interested in plugging. When that happens, a familiar, trusty program can become a security risk. #5: Keep Your Hard Drive Full and Fragmented Have you checked the free space on your hard drive recently? You may be surprised to find that it’s filling up fast. Why is your disk getting full? Downloading has become an everyday part of using a computer. Thanks to high-speed Internet connections, we can send and receive email attachments quickly and easily with pictures and videos that eat up hundreds of megabytes (millions of bytes) of space. Improvements in hardware and to the Web have transformed computers into all-purpose, networked, multimedia devices. Few ordinary computer users are aware that when they watch a video “online,” some or all of it is stored on their hard drive, temporarily or permanently occupying gigabytes (billions of bytes) of storage space. Operating systems and software programs require patching and updating to keep your computer safe. That’s more downloading and more space used up. New versions of software programs and operating systems with more features and improved security all require more storage space. Many programs create unseen temporary files and need extra free space on the disk to operate. That’s the space problem, but not the whole problem. The more you download and the more software you install, the greater the risk that some kind of malware (viruses, worms, and spyware) will find its way onto your computer. And while it may look like there should still be space left on your hard drive, little or none may actually be available. Your computer may slow down or start crashing. Even worse, programs and processes essential for maintaining its smooth operation may become erratic or not work at all. What began as a storage space problem has turned into a security threat. Every time you install and uninstall a program or add and delete data of any kind, your hard drive becomes “fragmented.” Disk fragmentation occurs because of the way information is stored on a hard disk: when you save something for the first time, it’s all stored in one place, in one piece, as one continuous file.
Recommended publications
  • September 1, 2010, V. 2.0 Rm+Dw Page 1 of 45 Software Licensing
    For use by the OE IT Design Team only Software licensing Main questions Now ­ What licenses are held at which level? How much do they cost? ­ How do these costs compare with those that might be obtained by aggressive contract negotiation, perhaps for a larger number of seats? Going forward ­ What are the Best Practices re: software acquisition, software distribution, and contract management? ­ Where are there economies of scale? ­ What are the barriers to purchasing through negotiated agreements? Are there incentives? ­ What are the options – on campus, at other UCs, in the “cloud”? Our current campus services ­ what we do now Customer value/software license products ­ Standard desktop software, e.g., Microsoft Office Suite, Adobe Creative Suite ­ Operating systems for individual machines and servers ­ Utilities ­ Security ­ Specialized software o Cross­discipline, e.g., statistical packages o Discipline/activity­specific, e.g., CAD­CAM, fundraising Cost/price factors included in the negotiation/calculation ­ Type of licenses o New (purchase) o Renewal (maintenance) ­ License term o Annual renewal September 1, 2010, v. 2.0 rm+dw Page 1 of 45 o “License term” then renewal o “Perpetual” so no renewal ­ Media o Delivered through the Internet (most; saves 9.75% sales tax) o If hosted on campus, server and associated costs o Some require receiving a CD, DVD, or flashdrive because of the file size or problems with different operating systems ­ The target user o Server o Single­seat = one machine o Person = one person w/five machines needs only one license o “Knowledge worker” FTE ­ Operating system ­ Version of software ­ Demand/volume ­ Transaction/key management/convenience/forecasting demand/pre­sales consulting add­on o In­house, perhaps 30% (IST draft, August 2010) o Outsourced .
    [Show full text]
  • Identifying Common Reliability/Stability Problems Caused by File Fragmentation
    WHITE PAPER Identifying Common Reliability/Stability Problems Caused by File Fragmentation Think Faster.™ Visit us at Condusiv.com CT Reliability-Stability WP 12-03-01.indd 1 3/2/12 5:19 PM IDENTIFYING COMMON RELIABILITY/STABILITY PROBLEMS CAUSED BY FILE FRAGMENTATION II Table of Contents INTRODUCTION 1 AN OVERVIEW OF THE PROBLEM 1 RELIABILITY AND STABILITY ISSUES TRACEABLE TO FILE FRAGMENTATION 2 1. Crashes and system hangs 3 2. Slow backup time and aborted backup 5 3. File corruption and data loss 6 4. Boot-up issues 7 5. Errors in programs 7 6. RAM use and cache problems 8 7. Hard drive failures 9 CONTIGUOUS FILES = GREATER UP TIME 10 BIBLIOGRAPHY 11 CT Reliability-Stability WP 12-03-01.indd 2 3/2/12 5:19 PM IDENTIFYING COMMON RELIABILITY/STABILITY PROBLEMS CAUSED BY FILE FRAGMENTATION 1 Introduction Over the years, numerous manufacturers, third party analysts and labs have reported on the effects of disk/file fragmentation on system speed and performance. Defragmentation has also gained recognition for its critical role in addressing issues of system reliability and improved uptime, particularly since Microsoft’s decision to include a defragmentation utility in the Windows 2000 and newer operating systems. Disk fragmentation is In this white paper, we explain some of the most common reliability and downtime phenomena often the “straw that broke associated with fragmentation, and the technical reasons behind them. This includes a discussion the camel’s back” when of each of the most common occurrences documented by our R&D labs, customers (empirical noting issues of stability results presented), as well as others, in recent years.
    [Show full text]
  • Diskeeper 9 User's Manual
    User’s Manual Diskeeper® for Windows® October 2004 This document describes the installation and operation of Executive Software International’s Diskeeper, The Standard in Entire Network Defragmentation™ for Microsoft® Windows. It is intended primarily for Windows system administrators and managers. Revision/Update Information: This is a new manual Software Versions: Diskeeper 9.0 Professional Edition Diskeeper 9.0 Server Standard Edition Diskeeper 9.0 Server Web Edition Diskeeper 9.0 Server Enterprise Edition Operating Systems: Windows Server™ 2003 Windows XP Professional Windows XP Home Edition Windows 2000 Server Windows 2000 Professional Windows NT 4.0 Server (SP 6 or higher) Windows NT 4.0 Workstation (SP 6 or higher) Windows Millennium Edition (Me) Windows 98 Windows 95 (OSR 2 or higher) Executive Software International, Inc., Burbank, California, USA ________________________ September 2004 __________ © 2002 – 2004 by Executive Software International, Inc. The Software described in this document is owned by Executive Software International, Inc. and is protected by United States copyright laws and international treaty provisions. Therefore, you must treat the Software like any other copyrighted material (e.g. a book or musical recording) except that you may either (a) make one copy of the Software solely for backup or archival purposes, or (b) transfer the Software to a single hard disk provided you keep the original solely for backup or archival purposes. You may not copy the user documentation provided with the Software, except for your own authorized use. RESTRICTED RIGHTS LEGEND The software and documentation are provided with RESTRICTED RIGHTS. Use, duplication, or disclosure by the Government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 or subparagraphs (c)(1) and (2) of the Commercial Computer Software-Restricted Rights at 48 CFR 52.227-19 as applicable.
    [Show full text]
  • Diskeeper and Disk Encryption
    Diskeeper ® and Disk Encryption OVERVIEW In the early 1990s, Diskeeper Corporation (a Microsoft ® Gold Partner) and Microsoft co-wrote Windows ® kernel-level code, and exposed an API (Application Programming Interfaces), prior to release of NT4 for third party software providers. This “MoveFile” API as it is called, has allowed defragmentation programs to operate as user-mode applications ever since, through Windows Server ™ 2008, Windows 7, etc… The benefit of having integrated defrag-based file movement in Windows is that all file movement in an online defragmentation operation by a product, such as Diskeeper, is entirely handled by the operating system. A defragmenter, such as Diskeeper, is from this viewpoint, logic that instructs the file system, via that API, to put file fragments that it discovers back together again into an available and contiguous free space on a given Windows volume. The process has been 100% safe for data since introduction in NT4. More recently, the NTFS file system added and fully supports disk/file encryption as evidenced by EFS (Encrypting File System), and Microsoft products such as Windows Bit Locker. It is fairly well known that Windows also ships with a native defragmenter (a product initially provided by Diskeeper for the Windows 2000 platform). It then stands to reason that Microsoft has a vested interest in maintaining continuing compatibility with defragmentation and, minimally, their own drive/file encryption solutions, and this is certainly the case. Over the years our vast install base (10 million+) has brought to our attention rare and temporary incompatibilities that other products have had with the Microsoft MoveFile API.
    [Show full text]
  • User's Manual Diskeeper® Software for Windows
    User’s Manual Diskeeper® Software for Windows® Maximizing Performance and Reliability Automatically January 2009 This document describes the installation and operation of Diskeeper Corporation’s Diskeeper for Microsoft® Windows. It is intended primarily for Windows system administrators and managers. Revision/Update Information: This is a revised manual Software Versions: Diskeeper 2009 Home Edition Diskeeper 2009 Professional Diskeeper 2009 Pro Premier Diskeeper 2009 Server Diskeeper 2009 HomeServer Diskeeper 2009 EnterpriseServer Operating Systems: Windows Vista® (varies by Diskeeper edition) Windows Home Server Windows Server® 2003 Windows Server 2008 Windows XP Windows 2000 Diskeeper Corporation, Burbank, California, USA ________________________ January 2009 __________ © 2009 Diskeeper Corporation. All Rights Reserved. The Software described in this document is owned by Diskeeper Corporation and is protected by United States copyright laws and international treaty provisions. Therefore, you must treat the Software like any other copyrighted material (e.g. a book or musical recording) except that you may either (a) make one copy of the Software solely for backup or archival purposes, or (b) transfer the Software to a single hard disk provided you keep the original solely for backup or archival purposes. You may not copy the user documentation provided with the Software, except for your own authorized use. RESTRICTED RIGHTS LEGEND The software and documentation are provided with RESTRICTED RIGHTS. Use, duplication, or disclosure by the Government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 or subparagraphs (c)(1) and (2) of the Commercial Computer Software-Restricted Rights at 48 CFR 52.227-19 as applicable.
    [Show full text]
  • Diskeeper® Sitekeeper® Undelete®
    Diskeeper ® “Set It and Forget It”® defragmentation solution for Windows® Undelete® Instant, easy file recovery for Up-to-the-Minute Data Protection® Sitekeeper ® The first and only easy-to-use systems management software Download Trialware Now At: www.executive.com • (800) 829-6468 Executive Software 7590 N. Glenoaks Blvd., Burbank, CA 91504 The “Set It and Forget It” defragmenter for Microsoft® Windows® XP, 2000, Server 2003, NT, Me, 9x Disk fragmentation is the underlying source of many system reliability and performance problems. Left unchecked, disk fragmentation can bring even the most powerful servers and workstations to their knees. NEW Diskeeper 9 is the solution! Diskeeper 9 is packed with new features and new technology. With its high-speed engine and new I/O Smart™ technology, Diskeeper 9 runs undetected in the background, eliminating fragmentation before it can affect speed and stability. FragShield™ boosts reliability by dynamically preventing fragmentation of critical system files. Network-wide installations of Diskeeper 9 are fast and easy with Diskeeper Administrator Edition, which provides fully- functional centralized management. Once installed and scheduled, Diskeeper 9 requires no administrator intervention. All you do is “Set It and Forget It!” Don’t let speed and reliability suffer. Get Diskeeper for all of your systems now! Instant file recovery and data protection for Microsoft Windows NT®, Windows 2000, Windows XP, Windows Server 2003 Undelete 5 with NEW Microsoft Office Version Protection is the only software system that gives you complete up-to-the- minute data protection! There are many deleted files that aren’t protected by the Windows recycle bin, including files deleted by another system over a network and overwritten Microsoft Office (Word, Excel and Powerpoint) files.
    [Show full text]
  • Diskeeper 2008 User's Manual
    User’s Manual ® ® DiskeeperP P for WindowsP P Maximizing System Performance and Reliability Automatically™ October 2007 ® This document describes the installation and operation of Diskeeper Corporation’s Diskeeper for MicrosoftP P Windows. It is intended primarily for Windows system administrators and managers. Revision/Update Information: This is a new manual Software Versions: Diskeeper 2008 Professional Diskeeper 2008 Pro Premier Diskeeper 2008 Server Diskeeper 2008 HomeServer Diskeeper 2008 EnterpriseServer Operating Systems: Windows Vista (varies by Diskeeper edition) Windows Home Server Windows Server® 2003 Windows XP Windows 2000 Diskeeper Corporation, Burbank, California, USA ________________________ October 2007 __________ © 2002 – 2007 by Diskeeper Corporation. All Rights Reserved. The Software described in this document is owned by Diskeeper Corporation and is protected by United States copyright laws and international treaty provisions. Therefore, you must treat the Software like any other copyrighted material (e.g. a book or musical recording) except that you may either (a) make one copy of the Software solely for backup or archival purposes, or (b) transfer the Software to a single hard disk provided you keep the original solely for backup or archival purposes. You may not copy the user documentation provided with the Software, except for your own authorized use. RESTRICTED RIGHTS LEGEND The software and documentation are provided with RESTRICTED RIGHTS. Use, duplication, or disclosure by the Government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 or subparagraphs (c)(1) and (2) of the Commercial Computer Software-Restricted Rights at 48 CFR 52.227-19 as applicable.
    [Show full text]
  • Diskeeper I/O Smart Performance Tests
    D Diskeeper - The Number One Automatic Defragmenter™ Diskeeper® I/O Smart™ Performance Tests OVERVIEW Keeping a drive automatically defragmented is critical to keeping your systems running at top speed. But the actual process of defragmentation has the potential to cause major slowdowns. Defragmentation involves moving pieces of data from one location on the hard drive to another. When another application needs data to be read or written (an input/output or I/O request), the drive has to split its time between the demands of both programs. Computer performance slows down and defragmentation takes longer. The result is a data traffic jam in which defragmentation can actually create the same condition it is intended to cure. In the 1990’s Diskeeper pioneered CPU and memory sensitivity through technology leadership and the leveraging of Windows® native process thread scheduler. While this has addressed resource conflicts in those areas, it does not handle the traffic jam (disk I/O queue) created on the disk subsystem. The proliferation of electronic multimedia, large data files and seemingly near daily increases in data storage capacity requirements has exacerbated the need for advanced technology. Diskeeper 9 handles this growing problem with innovative new I/O Smart technology. During background defragmentation passes, Diskeeper 9 actively “listens” for I/O requests. When another application or process needs access to the hard drive, Diskeeper intelligently pauses defragmentation until other program I/O requests are fulfilled. Once that happens, Diskeeper gets the go-ahead to resume defragmentation until another request comes along. Thanks to its high-speed engine, Diskeeper can easily defragment using the “spaces” between I/O requests, even on busy servers.
    [Show full text]
  • Diskeeper 2008 User's Manual
    User’s Manual ® ® DiskeeperP P for WindowsP P Maximizing System Performance and Reliability Automatically™ October 2007 ® This document describes the installation and operation of Diskeeper Corporation’s Diskeeper for MicrosoftP P Windows. It is intended primarily for Windows system administrators and managers. Revision/Update Information: This is a new manual Software Versions: Diskeeper 2008 Professional Diskeeper 2008 Pro Premier Diskeeper 2008 Server Diskeeper 2008 HomeServer Diskeeper 2008 EnterpriseServer Operating Systems: Windows Vista (varies by Diskeeper edition) Windows Home Server Windows Server® 2003 Windows XP Windows 2000 Diskeeper Corporation, Burbank, California, USA ________________________ October 2007 __________ © 2002 – 2007 by Diskeeper Corporation. All Rights Reserved. The Software described in this document is owned by Diskeeper Corporation and is protected by United States copyright laws and international treaty provisions. Therefore, you must treat the Software like any other copyrighted material (e.g. a book or musical recording) except that you may either (a) make one copy of the Software solely for backup or archival purposes, or (b) transfer the Software to a single hard disk provided you keep the original solely for backup or archival purposes. You may not copy the user documentation provided with the Software, except for your own authorized use. RESTRICTED RIGHTS LEGEND The software and documentation are provided with RESTRICTED RIGHTS. Use, duplication, or disclosure by the Government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 or subparagraphs (c)(1) and (2) of the Commercial Computer Software-Restricted Rights at 48 CFR 52.227-19 as applicable.
    [Show full text]
  • Diskeeper® Professional
    Diskeeper® Professional Overview Everyone knows the frustration of a Windows® laptop or workstation becoming progressively slower the longer it is used and burdened with more software and data. Condusiv’s Diskeeper® 12 Professional prevents degradation in Windows performance by eliminating nearly all fragmentation from occurring at the Windows level, before files are written in a performance-penalized state. With its patented, proactive IntelliWrite® technology, Diskeeper keeps laptops and workstations running like new, resulting in increased productivity and lower costs by extending the useful life of existing hardware. IT professionals who support a fleet of laptops no longer wrestle with persistent performance HelpDesk calls. Where typical defragmentation utilities consume resources to operate, and deal with the problem after the performance penalty has already been incurred, Diskeeper is the only proactive solution that solves the problem in real-time while running transparently in the background. Without Diskeeper, files are scattered around a volume instead of written in one place. Diskeeper’s IntelliWrite technology optimizes writes and subsequent reads by writing data sequentially, reducing seek time and the number of I/Os required to write a file or access it. Keeps Business PCs and Laptops Running Like New Most notably, Diskeeper’s low overhead and InvisiTasking® resource monitoring ensures all optimization occurs without hampering system resources, so users can continue working while Diskeeper runs in the background. Maintenance tasks, like defrag, are usually scheduled during off-hours to avoid impact on performance. However, if systems are shut down, maintenance activities fail to run, creating a bigger headache over time. And if the utility runs during business hours, the PC is rendered useless until defrag operations are complete.
    [Show full text]
  • Defragmentation Tutorial
    A Tutorial on Disk Defragmentation for Windows NT/2000/XP and Windows Server 2003 What You Don’t Know Can Hurt You May 2003 Table Of Contents Introduction..................................................................................................................................... 2 Fragmentation 101 .......................................................................................................................... 2 Fragmentation and Performance..................................................................................................... 3 The Costs of Fragmentation............................................................................................................ 4 Productivity................................................................................................................................. 4 Backup ........................................................................................................................................ 4 System Administration/Help Desk ............................................................................................. 5 Hardware..................................................................................................................................... 5 Myths or Misperceptions ................................................................................................................ 5 Myth 1-Our systems are new, we don’t need defragmentation software. .................................. 5 Myth 2- We have lots of free space so fragmentation’s
    [Show full text]
  • O&O Defrag V6 White Paper
    Sandro Villinger (MVP for Windows Shell/User) O&O Defrag V6 White Paper Table des matières (Administrateurs/professionnels) Introduction À propos de l'entreprise O&O Software 1 L'objectif de ce document 1 À propos de l'auteur, Sandro Villinger 1 Développement Ce qui se cache derrière le phénomène de la "fragmentation" 2 Les solutions de défragmentation intégrées de Microsoft 3 O&O Defrag V6 - Le but de O&O Software 4 O&O Defrag V6 - Les méthodes expliquées en détails 5 "Plus vite que l'éclair avec "Stealth" 5 "Optimisation selon l'espace : la méthode "Space" 5 "Performance accrue des systèmes de partition : "COMPLETE/Name" 5 "COMPLETE/Modified" - Optimisation fiable du serveur 5 "COMPLETE/Access" - Un vrai "all-rounder" 5 "Maintenant, quelles méthodes utiliser sur quel lecteur et dans quel ordre ? 6 O&O Defrag V6 - Aperçu de la technologie 7 Activity Guard Pro 7 Gestion de travaux 7 Défragmentation séquentielle/parallèle avec O&O Defrag V6 7 Boot-Time/Offline-defragmentation 8 Démarrage/Défragmentation hors ligne 9 Advanced Report Engine (ARE) 9 Benchmarks et comparaison 10 La procédure : une fragmentation maximale 10 Executive Diskeeper 8.0 13 Résultats du benchmark 14 Benchmark - Le bilan 17 O&O Software - Conclusion En résumé 18 À propos de l'entreprise O&O Software Depuis 1997, l'entreprise berlinoise O&O votre environnement de travail. En outre vous Software développe des logiciels utilisés autant en apprendrez plus sur les compétences par des compagnies que par sa clientèle privée. d'O&O Defrag V6 ou autres de nos produits et La parution de la première version de son pro- obtiendrez par le fait même un aperçu de la duit vedette O&O Defrag en 1998 a subsé- théorie de (dé-)fragmentation.
    [Show full text]